Explore
Intrusion Detection Systems
0 Ungluers have
Faved this Work
Login to Fave
The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of a practical application and results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions, such as an analysis of the anomalies of user behaviors and many others.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.